HackDig : Dig high-quality web security articles for hacker

The Tor Project announced the launch of a public bug bounty program. Bug hunters can earn between $2,000 and $4,000 for high severity flaws.
It’s official, the Tor Project announced the launch of a public bug bounty program through the HackerOne platform, the initiative was possible with support from the Open Technology Fund.
“With support from t

The AlphaBay Market went down Tuesday night without any explanation, many users that have purchased products on the marketplace fear the Exit-Scam.
The news is shocking, the AlphaBay Market, one of the largest Dark Web black markets is down. We have analyzed many times the popular black market where it was possible to buy any kind of illegal goods, including

UK.gov leaves data dashboard users’ details on publicly accessible on a third-party system. Users are urge to reset their password.
Are you a user of the UK Government website UK.gov? Change your password now!
Users of the government’s data dashboard have been notified that their information was accidentally made public so they urge to change their pas

ProtonMail announced ProtonVPN is now available to the general public. ProtonVPN is officially out of beta.
You can now directly get ProtonVPN by visiting https://protonvpn.com
After more than 1 year of development, and four months of beta testing by over 10’000 members of the ProtonMail community, we’re finally making ProtonVPN available to everyone. And we

The Moody Blues searched for the “Lost Chord,” Captain Kirk searched for Spock and the “In Search Of” television show sought to solve unexplained mysteries. Similarly, IT and security professionals are always searching for solutions that can balance myriad standards and regulations against a continuously evolving threat landscape.
A

It’s been almost three years since Google first announced its intention to add end-to-end encryption to Gmail. However, the free email service is yet to provide users with that feature. Despite the Internet giant insists that it was never a bluff, one of the company’s latest movements has reignited the criticism.
Recently, a spokesperson from Goo

The Egyptian government blocked a number of websites in Egypt, including the publishing platform Medium, without any official announcement.
Egyptians users of the online publishing platform, Medium were not able to access the service from their country. Readers and bloggers using both desktop and mobile app suffered access problems, the reason of the blackou

Browsers are constantly targeted by hackers. Here are 4 ways you can make your browser hacker-proof. Use them to stay secure on the web.
Browsers have long been a hot target of numerous hacking-related incidents. They are the primary source of hacking incidents as we search, share, watch and download files from browsers. Moreover, various vulnerabilities exi

One of the fundamental requirements for big data users is big data control. Failure to properly store, audit and maintain data chain of custody undermines our individual and collective privacy. This failure also may be at odds with federal law and policy.
Without data control, there is no data compliance. Fortunately, there is a host of big data analytics

A developer has discovered a flaw in the Chrome browser that could be exploited to secretly Record Audio/Video without indication.
The AOL developer Ran Bar-Zik discovered a disconcerting vulnerability in Google’s Chrome browser could be exploited by attackers to record audio or video without giving any visual notification or alert.
“After gettin

The European General Data Protection Regulation (GDPR) will take effect in one year from now, but a large number of firms are far from prepared.
It feels like Y2K all over again. We are less than one year until the impact of the GDPR is realized, no one is certain what will happen, and everyone is taking a different approach to mitigation.
In April 2016,

The US Congress decided to repeal an Internet privacy regulation passed under the Obama administration. For many, this is unsettling news.
Trump has already initialed the controversial repeal, which allows Internet providers to store and sell users’ browsing histories. The previous regulation, however, required these companies to obtain permission fr

Today’s phish blog breaks our format a bit so we can bring you lots of examples. Enjoy. And then get protected!
Phishing is prevalent because it works. Even savvy users can be tricked into opening the wrong emails.
I’ve seen a couple of clear examples of this recently. The first is one that quite convincingly mimics the invoice emails from a fairly sig

What lurks in our microphones?
Microphones play an important part in day-to-day life. We can talk with almost anyone in the world using our smartphones, tablets and laptops. We can even give our in-home smart technology instructions simply by speaking to it.
But this power and convenience often means that microphones have to be left switched on – which means

According to a draft document leaked online, UK Government is assigning itself more powers to spy on live communications and use malware for surveillance.
While the NSA is announcing it will stop surveillance activities on emails, texts, and other internet communications, the UK government has secretly drawn up more details of its new bulk surveillance power